Author
Topic: SecureAPlus v6.2.0 (Read 55 times)

There are a few new highlight features in this version:- Recommended action. When SecureAPlus application whitelisting prompts for an untrusted file from running, it will change the color to green or red, to give a hint for the end user whether to trust or continue to block the file from running.- Vulnerability assessment. This module will searched for vulnerability software installed in the system.- Automatically trust Windows Update files during boot-up

Here are the detail of the changes:Bugs fixed:- The following command line was not automatically trusted: C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Unrestricted -NonInteractive -NoProfile -WindowStyle Hidden "& C:\WINDOWS\system32\WindowsPowerShell\v1.0\Modules\SmbShare\DisableUnusedSmb1.ps1 -Scenario Client"- Windows 7 without Service Pack 1 was not able to boot up after updating from SAP v6.0.3 to v6.1.0- SecureAPlusService.exe is not running in some machines.- In Polish language, "Continue blocking" words in Command Line blocking was cut off.- For SecureAPlus managed by Management server, request for Whitelist approval, and check for Global Whitelist, is sent to portal. It is supposed to be sent to Management Server.

Modifications:- For script file, the GUI used to show the interpreter as the process name. Now it will show the parent process of the interpreter as the process name.- "Go to log location" will only open "C:\ProgramData\SecureAge Technology\SecureAge\log" folder only. Previously it will also open log folder in %localappdata%- Shows Japanese EULA in Japanese OS- Updated Italian translation.- KB3033929 was not installed in Windows 7 SP1 64-bit.- Do not show "Online Store" for SecureAPlus managed by Portal.- in interactive mode, no command line blocked prompt shown in Windows Server 2016 & 2019, when running untrusted command line.

What's new:- New dialog when blocking untrusted file, with Recommended Action.- Vulnerability Assessment- Automatically trust the untrusted Windows Update files during boot-up- Besides of whitelist.log, untrusted files that are supposed to be blocked, but not blocked, in the observation mode is also written in Blocked.log- Allow trusted installer to run any command line.- Trusted application that is signed by a trusted certificate is allowed to run any command line and script- No longer support ClamAV.- Trust all now can be managed from Management Server.- Added "tortoiseproc.exe" into restricted application list.